2011 Newsletter Header

Like us on Facebook   View our profile on LinkedIn   Follow us on Twitter   Find us on Pinterest   View our videos on YouTube

April 2015
In This Issue
NPS Update
Trivia
Ask the Expert
Fortinet April 22nd
WTA Conf. May 21st
Charity Buzzzzz (Cut)
Avaya Life Cycle Matrix
5 Contact Center Trends
ESI Blog
Global Security Reality
Unitrends - April Live Demo's
7 Principles of Data-driven Transformation
Quick Links to CCC...
Solutions
Manufacturer Links Below are links to manufacturer support and/or update sites. Please note some sites may require registration.  
NPS® Update
NPS

Current NPS®: 76.21%
Surveys
Completed: 3044

Click here to learn more about Net Promoter Score. 
Trivia
Trivia

 

TRIVIA ANSWER: 

Felix Unger was a neatnik; Oscar Madison a slob. They were divorced friends and roommates sharing an apartment in New York City. Nino's Italian Restaurant was their favorite eatery and they also managed to curtail their bickering long enough to write a song for singer Jaye P. Morgan. What did they call it?  

ANSWER:
"Happy and Peppy and Bursting with Love"

WINNERS:

Wiley Chandler
Dan Kurkiewicz

_________________ 

   

New Trivia

 

Fred and Ethel Mertz were the owners of the Manhattan brownstone that was home to bandleader Ricky Ricardo and his scatterbrained wife, Lucy. The Ricardos lived in Apartment 3B and paid how much a month for rent?  
Ask the Expert: Using Windows 7 Problem Steps Recorder to Capture Issues/Record Training
Gregorio Chaves, ConvergeSecure® Engineer 

Have you ever been stuck trying to explain to your IT support what is happening when you are having an issue with your computer? Do you have some friends or family members that aren't necessarily tech savvy and could benefit from step-by-step visual instructions for using applications and features? Well, if you have a Windows 7 computer you can use a great feature called Problem Steps Recorder to record and notate actions on your computer to help with troubleshooting or training.    

 

Read more... 

YOU'RE INVITED!
Fortinet Fast & Secure Tour 2015
Top Golf Wood Dale | April 22nd | 11am-2pm

Fortinet is on the move! We are going coast to coast and back again in the FortiExpress, Fortinet's training and executive briefing center on wheels. Inside FortiExpress you will see firsthand capabilities of Fortinet solutions.

Learn More About...

FortiGate - Whether you need to deploy a High Performance Data Center Firewall, an Enterprise Next Generation Firewall, or a smaller UTM device for your Distributed Enterprise or Small Business, there is a FortiGate physical or virtual application to fit your unique Network Security requirements (including FortiGate-VMX for VMware

FortiMail - FortiMail prevents your email systems from becoming threat delivery systems. Its inbound filtering engine blocks spam and malware before it can clog your network and affect users. Its outbound inspection technology prevents other antispam gateways from blacklisting your users by blocking outbound spam and malware, including mobile traffic.

FortiWeb - Using advanced techniques to provide bidirectional protection against malicious sources and sophisticated threats like SQL injection and Cross-site scripting, FortiWeb platforms help you prevent identity theft, financial fraud, and corporate espionage. FortiWeb delivers the technology you need to monitor and enforce government regulations, industry best practices, and internal policies.

FortiSandbox - FortiSandbox offers a robust combination of proactive detection and mitigation, actionable threat insight, and easy, integrated deployment. At its foundation is a unique, dual-level sandbox which is complimented by Fortinet's award-winning antimalware and optional integrated FortiGuard threat intelligence. Years of Fortinet threat expertise is now packaged up and available on site via FortiSandbox.

Fortinet Wireless - Fortinet's Secure WLAN is a comprehensive flexible, end-to-end wireless LAN security solution that incorporates wireless and wired access, security, authentication, switching, and management to help you adjust to the new demands for speed and security being put on your enterprise network.

Stay for Top Golf!
Top Golf is the premier golf entertainment complex where the competition of sport meets your favorite local hangout. Just picture a 240-yard outfield with dartboard-like targets in the ground. The closer to the center or "bulls-eye" you get and the farther out you hit your microchipped balls, the more points you receive.

WTA Education Conference
"Block the Threat - Cyber Security Conference"
Thursday, May 21, 2015 
WTA LogoHow secure are your systems?
Learn what organizations are doing in 2015 to BLOCK today's Cyber Threats!

Join the WTA and members for lunch, speakers, networking a beverage too!

Date: Thursday, May 21, 2015
Time: 12:00pm CST
Location:
Potawatomi Hotel and Casino
1721 W. Canal St.
Milwaukee, WI 53233

Event Pricing:
Members: FREE
Non-Members: $100.00*
Guests Registered by a Member: $100.00*

*Email memebship@wta-wi.org for discount code.

Guest Speakers Include:

David Cagigal - Chief Information Office for the State of Wisconsin and Division Administrator for the Division of Enterprise Technology (DET)

Nicholas Davis - Chief Information Security Officer for UW System (Most recently the University of Wisconsin at Madison in the IT Security Office)

James Gomon - Director of Telecommunications at WPS Health Insurance
Jim has responsibility for all equipment, services, applications, and security related to telephony for multi-state operations with regional contact centers.

Alex Holden - Founder and Chief Information Security Officer at Hold Security
Prior roles include: Director of Information Security - nuPSYS, Director of Enterprise Security - Cyopsis, and Chief Information Security Officer for a large brokerage firm.

Daniel Bailey - Director of Usher Product Security for MicroStrategy
Dan has applied for more than 35 patents, with 22 issued to date. His research papers have appeared in Crypto, Journal of Cryptology, Security and Cryptology for Networks, and others.

Kevin Thompson - Threat Analyst at FireEye
Prior to FireEye, Kevin worked as a cyber analyst for the CIA in Washington, D.C.

Charity Buzzzzzzzzzzzzz (Cut):
CCC Intern, Phil Mahoney, Gets a Buzz Cut to Support St. Baldrick's 
CCC Intern Phil Mahoney showing off his new 'do.

 

On March 20, 2015, CCC Technologies Intern (and Elk Grove High School student) Phil Mahoney participated in Elk Grove High School's St. Baldrick's fundraiser by raising money and having his head shaved. 

 

Phil and his classmates shaved their heads to help their school raise more than $30,000 for St. Baldrick's. 

 

St. Baldrick's Foundation started in 1999 and has raised more than $100 million for childhood cancer research.

 

For more information about the St. Baldrick's Foundation, please visit: www.stbaldricks.org

NICE WORK PHIL - THE NEW CUT LOOKS GREAT!!!!

 

Avaya Life Cycle Matrix
Updated March 26, 2015 
Click on the image above to download the Latest Avaya Life Cycle Matrix, Updated March 26, 2015

WHITE PAPER
5 Contact Center Trends You Need To Know  
The face of the contact center has changed dramatically over the past few years and continues to change at an exciting and rapid pace. This is the result of new technologies, every-changing customer behaviors, and a fundamental shift from focusing on traditional customer satisfaction measures to creating a customer experience.

Keep pace with your customers while creating quality customer experiences with contact center technology. Discover the five contact center trends and must knows to help you stay competitive.

Download the White Paper...
ESI Blog:
How to Spring into Your New UC Services
ESI Logo

This season, instead of having the office simply conduct the annual spring cleaning, consider revamping the business with unified communications solutions such as VoIP phone systems.

 

Spring is a time for change and growth, and it's not limited to the budding in nature. This season, instead of having the office simply conduct the annual spring cleaning, consider revamping the business with unified communications solutions such as VoIP phone systems. A major part of the transition to UC involves finding a provider and building a solid foundation with them. Here are some steps companies can take to create a clear understanding of a provider's services. 

 

Read more...
The New Global Security Reality
Fortinet: The New Global Security Reality
Fortinet: The New Global Security Reality

Unitrends Live (Online) Product Demonstration Schedule for April
Unitrends Logo As a Unitrends partner, CCC Technologies has a portal available to our customers with a regular schedule of live (online) product demonstrations. Below is the upcoming schedule for April.

TWO LIVE DEMOS TO CHOOSE FROM
  1. Backup Products Demo: Curious about how Unitrends backup appliances can help you easily recover your data? Join us on Tuesdays at 2pm ET and Thursdays at 11am ET to watch our backup experts crash and recover a server LIVE, and take you on a tour of the Unitrends interface while showing you key features like deduplication, encryption, reporting, and more.
  2. Disaster Recovery (DR) Product Demo:  Learn about ReliableDR-the only solution that delivers disaster recovery assurance for Hyper-V and VMware-on Wednesdays at 11am ET. See how you can automate the disaster recovery process to dramatically reduce the cost and complexity of virtual machine failover, failback and testing during these weekly live sessions.
APRIL LIVE DEMO SCHEDULE
  • ReliableDR
    • Wednesday, April 8th 11am ET
    • Wednesday, April 15th 11am ET
    • Wednesday, April 22nd 11am ET
  • Backup Products
    • Thursday, April 9th 11am ET
    • Tuesday, April 14th 2pm ET
    • Thursday April 16th 11am ET
    • Tuesday, April 21st 2pm ET

 

MORE INFO and SIGN UP 

 

7 Principles of Data-driven Transformation
Thor Olavsrud - from CIO.com | March 31, 2015 
Becoming a data-driven enterprise requires a plan and the right people, technology and culture. These seven principles of data-driven transformation will help you successfully make the journey.


How to do data-driven transformation successfully

Harnessing information so that your organization can become data-driven is no simple task. You need to be able to rapidly assimilate, integrate and analyze your data - existing internal data and the growing stream of big data from new internal and external sources - and turn it into insights that you can act upon at the point of action. Jeff Hunter, vice president of the NA Insights & Data practice at Capgemini, says a Capgemini survey of 1,000 C-level executives and senior decision makers reveals seven principles CIOs should follow to help their organizations successfully transform into data-driven enterprises.

Read more...